Follow us
Get in touch with us



使用金雅拓的身份信息和数据保护解决方案,企业可以采用以数据为中心的方案保护其数据安全,全面管理相关的基础设施和应用程序。它们不但可以在交易过程中创建信任和认证授权,更可以保证敏感信息得到保护和控制 — 包括在企业内部和公有及私有云。除提升防护等级外,企业可以根据未来的身份信息和数据保护需求进行扩展,提高业务效率。


  • 身份和访问管理 
  • 数据加密 
  • 加密管理 
  • 云安全 

  • 2015年上半年外泄水平指数报告







  • Challenges and Solutions to Enterprise Mobile Security - White Paper

    Challenges and Solutions to Enterprise Mobile Security - White Paper

    Studies show employees use three or more different devices for work on a daily basis and 89% of mobile users will access business applications using their personal devices. The rapid increase in mobile usage has many IT teams scrambling to get enterprise mobile security in line with current corporate standards.

    Read the whitepaper
  • A Security Survey of Strong Authentication Technologies

    A Security Survey of Strong Authentication Technologies - White Paper

    All authentication methods are based on providing the legitimate user with a method for proving his or her identity. Such “proof” can involve different form factors, such as something only the user knows (like a password) or something only the user has (like an external piece of hardware or the user’s biometric information). It could also be something that the user is, such as unique physical attributes, for example, a fingerprint or retinal scan.

    Read the white paper

​​ 查看所有文件​​


  • - 防护数据泄露:三步走措施加强数据安全

  • 了解金雅拓SafeNet身份信息与数据保护解决方案

  • 观看在线研讨会


  • Posted on Sep 22, 2018

    Discuss Notifiable Data Breaches with Gemalto at AISA Cyber Conference 2018

    Like to comply with the Notifiable Data Breaches (NDB) Scheme? If you plan on attending the 2018 AISA Cyber Conference please stop by the Gemalto Stand (77) and meet the Gemalto team. Our cyber security experts will discuss how to develop an access management strategy that includes multi-factor authentication to protect your organization from identity theft.

    Read this post